This open-source project tracks RED-LILI's activity over time as there are evidence the actor is still active. All information provided here is intended for research purposes.
☆11Jun 23, 2023Updated 2 years ago
Alternatives and similar repositories for red-lili
Users that are interested in red-lili are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Find which of your direct GitHub dependencies is susceptible to RepoJacking attacks☆63May 29, 2022Updated 3 years ago
- scans popular packages and alerts in cases there is suspicion of an account takeover☆42Feb 20, 2022Updated 4 years ago
- Mobile Security - OMTG-Android Walkthrough☆11Oct 31, 2019Updated 6 years ago
- This open-source project tracks CuteBoi's activity over time as there are evidence the actor is still active. All information provided he…☆27Jul 23, 2023Updated 2 years ago
- Inspect repository data, including countries and organizations of stargazers and forkers.☆41Mar 1, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Too many secrets (2MS) helps people protect their secrets on any file or on systems like CMS, chats and git☆152Apr 29, 2026Updated last week
- A POC reverse shell that can utilize multiple major web-browsers to provide remote access. Intended to demonstrate remote control of an e…☆13Dec 1, 2016Updated 9 years ago
- An RSS server on top of yad2.co.il☆14Oct 19, 2022Updated 3 years ago
- Subtitles service for Subscenter.org Kodi (XBMC): Helix - Krypton☆13Oct 14, 2018Updated 7 years ago
- OpenControl-formatted industry standards and requirement documents☆50Aug 28, 2023Updated 2 years ago
- Cross-platform process dependency monitor with GUI☆10Feb 23, 2026Updated 2 months ago
- Arduino projects for my home control system.☆19Jul 15, 2014Updated 11 years ago
- archives for Tongji CTF 2017☆10Oct 25, 2023Updated 2 years ago
- ☆12Jan 9, 2023Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Data, analytic code, and findings supporting BuzzFeed News's analysis of diversity in the dialogue of Best Picture–nominated films☆10Jun 21, 2022Updated 3 years ago
- BOF to terminate a process via PID as argument☆28Sep 7, 2025Updated 7 months ago
- Mass malicious script dump/Malware src dump☆16Nov 25, 2016Updated 9 years ago
- wechat web client on wechaty☆10May 17, 2022Updated 3 years ago
- This is my path to OSCP☆11Jun 16, 2018Updated 7 years ago
- WebGL Action RPG☆22May 8, 2011Updated 14 years ago
- Here are some tools I developed to help analyze malware☆11Nov 8, 2023Updated 2 years ago
- ☆44Jun 2, 2021Updated 4 years ago
- generating images to attract attention in social media☆14Nov 9, 2017Updated 8 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆11Oct 20, 2022Updated 3 years ago
- Full Antivirus Evasion for Mimikatz☆14Mar 10, 2017Updated 9 years ago
- All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities☆11Jan 27, 2017Updated 9 years ago
- Azure Databricks workshops with content on connectivity to Azure services, data engineering workflows and data sciences notebooks.☆11Feb 20, 2019Updated 7 years ago
- GET-ACQ is a python tool used to gather all companies acquired by a given company domain name. It is done by calling SecurityTrails API.☆12Nov 10, 2021Updated 4 years ago
- MiKey is a minimal and modular Linux keylogger. It provides a toolkit that monitors and records all activities performed on a computer. I…☆15Jan 29, 2014Updated 12 years ago
- Free sampling of files from the purported Equation Group hack.☆11Apr 10, 2017Updated 9 years ago
- Ivan Ricart Borges - Test for didactic purposes of web pages vulnerables to SQL injection using dbo database user with xp_cmdshell execut…☆21May 15, 2021Updated 4 years ago
- ☆21May 10, 2017Updated 8 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Simple customer and order management system written especially with photographers in mind☆13Nov 19, 2018Updated 7 years ago
- Tiny cpu benchmark☆28Aug 16, 2018Updated 7 years ago
- ☆13Sep 21, 2017Updated 8 years ago
- Discover domain names based on SSL certificates.☆15Dec 18, 2024Updated last year
- An Open Source KoTH Platform☆12Jul 19, 2023Updated 2 years ago
- Input list of keywords, crawler top (url, title, description) data from Google Search.☆17Nov 21, 2025Updated 5 months ago
- See what your AI agents can access. Scan MCP configs for exposed secrets, shadow APIs, and AI models. Generate AI-BOMs for compliance.☆149Apr 13, 2026Updated 3 weeks ago